IPhone security is impeccable? Unofficial cracking has turned the "iron wall" into "paper paste"!

  Cctv newsRecently, the reporter used the keyword "crack iPhone" to search on Taobao. As a result, a large number of services called "professional activation" and "remote unlocking" appeared on the page, claiming that the locked iPhone can be easily cracked.

  As a mobile phone known for its security, the iPhone’s "iron wall" seems to be "paper paste" in Taobao sellers, and it will be broken in a few minutes or a few days. How do these sellers do it? As our most important "possessions", is the security performance of mobile phones reliable?

  Open these "cracked iPhone" sellers’ pages. There are hundreds of single businesses and dozens of them. It seems that this market is not small. When the comments were opened, there was a lot of applause, and the satisfaction of buyers was beyond words.

  Looking through their messages, we will find that they have different purposes to crack their mobile phones: the mobile phones are picked up, cracked and reused; Forgot the power-on password and tried to be locked for many times; IPhone lost, need to remotely erase ID, and so on. Different purposes correspond to different treatment methods, and naturally correspond to different levels of price.

  According to industry insiders, there are still some "unspeakable reasons", for example, mobile phones are stolen."Seriously speaking, the cracking service provided by these sellers has become a part of the mobile phone theft industry chain. However, buying and selling have their own needs, and tacitly, it also makes the mobile phone cracking industry a regulated ‘ Grey zone ’ 。”

  The reporter tried to get in touch with several Taobao sellers, and the other party’s response was basically the same routine. That is,Tell your story first — — Whether the mobile phone is picked up or your own, whether you forgot your ID or password, and so on. When the reporter explains his purpose, the other party gives instructions concisely — — Hand over the IMEI code of iPhone.

  IMEI (International Mobile Equipment Identity) is the abbreviation of International Mobile Equipment Identity Code, which is an electronic serial number consisting of 15 digits. After assembly, each mobile phone will be given a set of globally unique numbers.

  Taobao shop owner’s "solution", experts judge, there are several possibilities. "The reason why they say it will take a few days is that they don’t guarantee that they can crack it. It is likely that it will take a few days to ‘ Collision with the library ’ 。”

  "Crash into the library" is an attack method. Hackers collect the leaked user name and password information on the Internet, generate corresponding dictionary tables, and use technical means to go to some websites to "try their luck" one by one and try to log in.For example, take the iTunes password that the user has leaked to try the boot password.

  In addition, several Taobao stores that the reporter asked all said that they could not save data after "cracking". Some of them are simple and rude, such as directly restoring the factory settings of mobile phones.Experts explained that the user’s choice of "unlocking" in this way is equivalent to "pushing the house when the door key is lost", which is definitely a "high-risk operation". In addition to extreme situations such as picking up or even stealing a mobile phone, contacting the official is the right way.

  At the same time, their possible practices include cracking the mobile phone device itself, monitoring or intercepting user information during transmission, etc. "Although there are few loopholes in the operating system of the iPhone, even the most secure system may exist ‘ Zero-day vulnerability ’ 。” Experts are blunt.

  "zero-day vulnerability", also called zero-day attack, refers to a security vulnerability that is exploited maliciously immediately after being discovered.The WannaCry ransomware that broke out in 2017 was developed by hackers with the attack code leaked by the National Security Agency. In other words, the loopholes held by the government were obtained and exploited by hackers.

  "Security is a relative concept." Experts have repeatedly stressed that, especially at the moment when various applications are emerging one after another, any operation must be networked, and any loopholes may be magnified. "Mobile phones have various security settings and data can be encrypted. However, from the perspective of computational science, the current encryption mechanisms can not ensure absolute security, and cryptanalysts are constantly looking for loopholes in these algorithms. What we can do is to make the hacker’s attack so costly that they have to give up. In other words, there is no safest, only safer. "

  Source: Science and Technology Daily

  Do the following 10 things as soon as you lose your mobile phone, which can minimize the loss!

  1. Call your mobile phone

  Find another mobile phone at the first time and dial your own number to confirm whether the mobile phone is lost. If it is, the phone will always be turned on.

  If it is stolen, it will generally show the power-off status, and if the perpetrator is not found, the use of making a phone call at the first time is to find the thief by ringing the phone.

  Step 2 notify family and friends

  Be sure to memorize the numbers of several relatives and friends, which can help you in an emergency.

  Publish the news of lost mobile phone on social software such as QQ and friends circle.

  3. Call the operator to report the loss of the mobile phone number

  Call the operator or find the nearest operator’s business point, report the loss and freeze the SIM communication card. If you need to provide the service password for reporting the loss of the SIM card, it doesn’t matter if you forget it. Provide the customer service staff with your ID number and name, and the SIM card will be suspended for 24 hours.

  4. Call the bank to freeze online banking

  When the mobile communication tool opens a small partner linked to bank cards and online banking, and there is a large amount, you must call the bank at the first time and report the loss orally to freeze the bank card.

  5. If the mobile phone is bound to Alipay, report the loss.

  If your mobile phone is bound with Alipay, and the function of password-free micropayment is set, it means that your wallet is also lost! You have to call 95188 Alipay official customer service phone to report the case and unbind the mobile phone number from Alipay. Another way is to log in to Alipay account on the computer and freeze the account.Specific operation: security center → emergency service → Report the loss quickly.

  6. Freeze the WeChat account

  Wechat is also bound to the small partner of the bank card. Once the mobile phone is lost, immediately log in to Tencent’s security center to freeze your WeChat account.Link: http://110.qq.com

  Or find another mobile phone or other ways to log in to your WeChat frozen account.Specific operation: Open WeChat → I → set up → Account number and security → Wechat security center → Freeze accounts.

  7. Modify the social account password

  Passwords of Weibo, WeChat, QQ, email, all kinds of social software, shopping software and video software must be changed! Especially those who log in automatically on their mobile phones! After the change, remember to inform your friends that your account has been stolen. If someone sends out information behaviors such as borrowing money, be vigilant and don’t believe it.

  8. Get a replacement card from the mobile phone operator.

  Although the mobile phone is lost, the mobile phone card can still be used. Just bring your ID card and go to the business hall to reissue one.

  9. Find the contacts in the address book

  Usually, we should develop the good habit of backing up the phone address book, so we don’t worry about losing our friends’ contact information when an accident happens. You can use QQ, Baidu Cloud Disk or WeChat for backup. Take WeChat as an example, the specific operation:open WeChat → I → set up → be in common use → function → Address book security assistant → Backup/recovery.

  Step 10 report the case

  In a certain area, thieves generally belong to gangs, and the increase in the number of reports can attract the attention of the police and strengthen the maintenance of public security in the area. Fortunately, the mobile phone may still be found.